teancum144 wrote: » An accountant has logged onto the company's external banking website. An administrator using a TCP/IP monitoring tool discovers that the accountant was actually using a spoofed banking website. Which of the following could have caused this attack? A. Altered hosts file B. Blue snarfing C. Network mappers D. DNS poisoning E. Packet sniffing The answer is "A", but why couldn't it be "D"?
paul78 wrote: » If DNS poisoning was used - TCP/IP monitoring (which I presume to mean packet sniffing analysis) would not have been able to detect DNS poisoning as the poison-ed DNS entry would match the expected HTTP traffic to the IP destination.
teancum144 wrote: » I actually enjoy the analysis and it improves my understanding (which is more important to me than passing the test - although passing is still important). I cannot emphasize enough how grateful I am -- I'm learning so much from you guys.